A proposal for an e-voting system and its legal consequences
|
|
- Vivian Townsend
- 6 years ago
- Views:
Transcription
1 A proposal for an e-voting system and its legal consequences STAVROS VALSAMIDIS KALLIOPI KALAMPOUKA SOTIRIOS KONTOGIANNIS THEODOSIOS THEODOSIOU Department of Accountancy Kavala Institute of Technology Agios Lucas GREECE (12pt Times New Roman, centered) Abstract: - In this paper we present a framework for conducting electronic elections over the web taking into consideration the legal consequences. The proposed system has to be based on open source software with its own security protocol. It will be an alternative and practical solution to existing e-voting systems applications not only for communities, universities and organizations but for national and communities elections as well. Key-Words: - E-voting, Electronic Election Systems, Requirements, Types, Legal Aspects, Technical Aspects 1 Introduction E-democracy is a term produced from the words "Electronic" and "democracy," and comprises the use of electronic communications technologies such as the Internet in order to enhance democratic processes and provide increased opportunities for individuals and communities to interact with government and for the government to seek input from the community [37]. E-democracy is at the convergence of traditional democratic processes and Internet technology [34]. E-democracy can also be deemed as the use of electronic communications technologies, in the policy-making process and the government-citizen relations in order to encourage a direct and more active citizen participation in public life and the decision-making process. E-democracy is also sometimes referred to as cyberdemocracy [59], teledemocracy [2] or digital democracy. E-voting is a term produced from the words "Electronic" and "voting" and encompasses several different types of voting, embraces both electronic means of casting a vote and electronic means of counting votes [41]. Electronic voting is the option of using electronic means to vote in referendums and elections, including polling place e-voting and remote e-voting. Remote e-voting options include voting over the Internet and the use of personal digital assistants (PDAs) or telephones or mobile phones to cast a vote electronically. Electronic voting technology can include punch cards, optical scan voting systems and specialized voting kiosks. It can also involve transmission of ballots and votes via telephones, private computer networks or the Internet. E-democracy includes within its scope electronic voting, but has a much wider span than this single aspect of the democratic process. Other premier web applications that offer a means of electronic democracy are: electronic elections, electronic debates, electronic pre-election gatherings, public speeches, electronic parliament, electronic government and others. Electronic elections are nowadays one of the most popular issues of e- democracy. This has led to the development of applications. The problem that arises is that such applications are created either on demand for a specific election process, or experimentally for scientific purposes. Modern Electronic Voting Systems (EVSs) can be divided into two major categories: DRE (Direct ISBN:
2 Recording Electronic) voting systems and Internet voting systems. DRE systems utilize touch screens, keyboards, NFC and smart card equipment for voter authentication and voting purposes. The voting process takes place in voting terminals, located at specific polling areas which are directly connected, or not, to a central station [13]. The votes are immediately added to a running tally stored at the remote central station, if this station exists, or, if not, in the DRE s storage system (hard disk, memory card). Mail voting systems also belong to this category. DRE systems have two distinct characteristics: (1) DRE systems combine hardware and software to one embedded device, keeping the implementation hidden for both hardware and software and (2) utilize physical security in terms of specific voting areas (polling stations) in order to assure EVS system authentication and security requirements. One of the first DRE EVSs used is SENSUS DRE, created by Lorrie Faith Cranor at St. Louis University, Washington in 1995 [12]. It uses blind signatures to assure that voters will vote only once. Its initial purpose was to replace voting by mail. Today it is considered quite old and it has been abandoned. The company TrueBallot, Inc has presented the DRE system [58], which is used by companies, organisations, universities, associations and by teams of users for the conduct of electronic elections. The Trueballot system offers 3 basic operations: ScanVOTE / TouchVOTE Ballot-On- Demand which imitates physical voting, WebVOTE which uses Internet and TeleVOTE which uses the telephone as a means of conducting the voting. The DRE Diebold AccuVote-TS system [13], used in US elections, constitutes an embedded device with both hardware and software so that a user by using a touch screen with a card reader may authenticate and vote, after being authenticated by polling officials (votes are cast at specific poll sites) [4]. The SureVote company [56], provides a similar system, in which the users authenticate themselves and their right to vote using a numeric personal identification code and a numeric ballot code [4]. It also offers a web-based Internet EVS system. Internet EVS systems, on the other hand, use a computer or digital television or a mobile phone (by any hardware means) with custom software provided by a central voting station or stations over the Internet (using Internet software technologies), for voting purposes. Elections are held everywhere using remote Internet voting, thus increasing EVS system s availability usability and scalability. This, of course, may be contentious because it is difficult to verify that the voter is who they claim to be. Both anonymity and privacy may easily be compromised. This opens the door to voter coercion and vote buying. Such drawbacks lead to the implementation of more strict security mechanisms on Internet EVSs. Such systems are presented in the next paragraph. Safevote is a software company which offers a variety of products supporting both public and private elections using Internet voting [51]. The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the Internet [22]. Moreover, browser based Agile E- Voting system is another effort to provide a practical, voter-friendly e-voting system [55]. The Global Election Company provides election.com [20], which is global election software. It offers poll site voting and remote electronic voting. Finally, GNU FREE (Free Referenda and Elections Electronically [21] is an Internet based system which started being developed in 1999 as a free electronic voting EVS system. Its implementation is database and platform independent. Today this project has been abandoned. Various publications have addressed the benefits and risks of e-voting systems [41, 44, 1]. Electronic forms of voting have been implemented at some scale in many different countries, though in very different ways [46, 48]. The first electronic election scheme was proposed by [8] who is the inventor of ecash. He describes a unique method where voters can positively confirm their ballots, both at the polling station and also after the election; to be sure they are correctly entered into the tallies, without revealing their choices. This groundbreaking work may eventually form the basis of secure and auditable future elections [10]. Mercuri has been investigating a wide range of electronic voting issues and addresses usability issues [38]. A paper which thoroughly surveys issues relating to usability of electronic voting systems and reports on a series of studies was written by [4]. It was an early indication of machine failures with the Diebold equipment. Another interesting paper, which details the requirements, design and implementation of a special type of electronic voting system, the remote on-line voting system, suitable for a university setting where students can cast their votes anytime, anywhere, using either fixed or mobile electronic devices including personal computers, personal digital assistants and smart and regular phones, is proposed by [47]. The usability issues in various election systems, with the conclusion that newer technologies are not necessarily an improvement for voters is proposed by [49]. The use of distance electronic voting ISBN:
3 systems, in the support of non political elections, has been researched in many studies [16, 57]. An overview of voting security threats and vulnerabilities along with an assessment of strengths and weaknesses of potential solutions is presented by Fischer [18]. The paper is organized as follows. Section 2 describes the problem formulation with the requirements of an e-voting system, the existing EVS (Electronic Voting System) technologies along with their corresponding applications and the legal aspects. Section 3 presents the problem solution in terms of technical design and legal consequences. Finally, section 4 deals with the discussion related to advantages and disadvantages of such a system. In section 5 useful conclusions are drawn after the presentation of the proposed system. 2 Problem Formulation In this section the legal issues, the requirements and the types of EVS systems are described in detail. 2.1 Legal Issues According to Article 51 para 3-5 of Greek Constitution "3. The deputies are elected by direct universal suffrage and secret ballot by citizens who have the right, as provided by law. The law can not restrict the right to vote unless there has completed a minimum age or legal incapacity or as a result of irrevocable criminal conviction for certain crimes. 4. The parliamentary elections held simultaneously throughout the Territory.... As for the voters, the principle of simultaneous of elections shall not prevent the exercise of their right to vote by postal vote or other appropriate means, provided that counting and announcement of results is carried out whenever possible and throughout the State. 5. The voting is compulsory.". Τhis provision establishes the following basic, essential and fundamental principles of: (a) Universality, is deliberate on the part of the State minimization of the skills required in order for a person to participate as a voter in elections. (b) Immediacy is the non-interference will or intermediate body between the expression of the choice of the voter and the enactment of the electoral outcome. (c) Secrecy is to ensure nondisclosure of the content of the vote in another person outside of the voting [30]. Simultaneity means that the expression of individual electoral preference expressed without the possibility of knowledge of other results in the same election. 2.2 EVS Requirements Electronic Voting Systems requirements fulfil generic functionalities and attributes of an electronic voting system [3, 32, 50, 11]. System requirements define electronic voting system functionality. These capabilities apply to three different phases of the voting process: Before the voting process occurs, during the voting process and after the voting process completion for a voter x [19, 40]. The prevoting process requirements of an electronic voting system are the following: Authenticity: This means that only selected voters may vote and the electronic voting system must provide proof with the use of appropriate authentication mechanisms that a selected voter is the one that cast the vote [23]. Freedom: The electronic voting system must provide the ability to all selected voters to vote for whatever candidate they wish, or none for an election process [23]. Eligibility: Only eligible voters are permitted to vote [12, 15, 17, 23, 26]. Practicability: No extra skills are required to vote and no additional equipment is required [12, 26, 33, 35]. During election processes, an electronic voting system must maintain a high standard of the following capabilities: Robustness: The electronic voting system must provide all the necessary mechanisms to prevent interruption of the election process or system s denial of service. A malicious voter cannot frustrate or disturb the election [17, 9, 27]. Security: During an election process the electronic voting system must maintain vote integrity, voter anonymity when casting the vote and encrypt the vote in order to prevent eavesdropping [52, 53]. Uniqueness: The electronic voting system must provide appropriate mechanisms that ensure that voters are uniquely identified for an election process and vote only once [12, 15, 17, 23, 26, 33, 35, 36]. Verifiability: The electronic voting system must provide the voter a proof receipt that his/her vote drop at the tally was acknowledged. This receipt may be used after the voting process by the voter to confirm that his/her vote was accounted by the election committee [7]. Fairness: The electronic voting system must not provide any information about the outcome of an election process during the election process. No one can learn the voting outcome before the tally [17]. Democracy: All votes are equal and have the same weight. The principle: One voter- one vote ISBN:
4 must be sustained by the electronic voting system during an election process [40]. After an election process, there are also electronic voting system requirements that must be fulfilled: Privacy (anonymity): When the votes are verified by the election committee, the electronic voting system must provide anonymity mechanisms so that the voter cannot be traced back by his/her vote. There is no way to derive a link between the voter s identity and the marked ballot. The voter remains anonymous [9, 12,15,17,23,26,33,36]. Accuracy: All valid votes are counted correctly. The electronic voting system must count all votes and must count them as cast. A voter s vote cannot be altered, duplicated, or removed. Of course in a real electronic voting system appropriate error thresholds must be set that will indicate the validity of an election process [53,9,12,15,17,27,26,33,36]. Integrity: The electronic voting system sustains the vote integrity [53]. Uncoercibility: The electronic voting system may use appropriate mechanisms to prevent a user proving how he/she voted [5,12,23,25,43]. There are also system-specific requirements that must also be taken into consideration for the design of an electronic voting system. Such requirements are the following: Accessibility: The electronic voting system must be accessible to voters regardless of their geographical location or electronic equipment they use, so as to access the electronic voting system (computers, PDAs, cable TV, mobile phones et al. [52, 4]. Availability: During a voting process, the electronic voting system must maintain the same availability response for all voters. Today, availability problems of Internet services are less network link related and more erroneous service design and service user sustainability related [24, 52]. Reliability: Electronic voting system reliability is identified by a set of performance metrics. Efficiency: The computations can be performed within a reasonable amount of time [26, 33]. Mobility: There are no restrictions on the location where voters can cast their ballots. The electronic voting system must provide methods to cache user voting sessions in case a voter faces roaming problems or interacts with the electronic voting systems over network interfaces with latency problems (satellite links, mobile phones, wearable devices [12, 26,33]. Multi language support: The electronic voting system must provide multi-language support for voter registration, election process and election results display [38]. Care for Special Needs: The electronic voting system must provide ways of interaction with the system for people with special needs [4]. There are also election-specific requirements depending on the conditions of conducting the electoral process, e.g. the exclusion of a candidate from the electoral committee of the elections. 2.3 E-voting types There are many ways to categorize voting systems depending on the needs they have to fulfil, the technologies they use, the voting location, whether they are supervised or not. We could also subcategorize technologies according to the network and the equipment they use. We show the taxonomy of voting systems based on previous [42, 47, 61]. We divide the elections into the physical voting and electronic voting Physical voting It is divided into conventional voting and epistolary voting. Conventional voting It can be materialized either by the typical ballots or by the epistolary voting of absentees. Computer counting It can be materialized either by optical scanning systems or by punch card systems. In the former means, the ballots are marked by voters in such a way that an optical counting machine can read them. In the latter, divots are removed from perforated cards. The ballot cards are then collected and tallied at a central polling station [45]. Computer counting systems are vulnerable to fraud and error Electronic voting It is divided into direct recording electronic voting, polling station voting, Internet/private network voting and phone voting. The latter could be a subcategory of remote voting, as will be presented later on. Direct Recording Electronic [DRE] voting Voters use touch screen systems or keyboards on PC based technologies to vote at a terminal which is directly connected to a central station [14]. The votes are immediately added to a running tally stored in a computer storage system. The final DRE tally is then moved to a central location where it is added to the tallies obtained from other DRE machines. Polling Station voting Voters use voting system clients to submit their votes electronically. The whole process is usually controlled by authorized entities. Subcategories of ISBN:
5 this category can be the means by which the voting is achieved, such as poll sites, kiosks, or any digital equipment connected to the network. Kiosk e-voting consists of voting oriented machines being used in the polling station or elsewhere, to let electors cast their votes. Votes are cast using buttons or a touch screen and are stored in an electronic memory. Poll site voting requires voters either to go to staffed polling sites and use computers to cast their votes or to use a network (Internet or private) to transfer ballots from each polling place to a centralized site, where votes are tallied and election results are published. Internet/private network voting It includes both poll site voting and remote voting. Remote voting Voters use a computer or a digital television or a mobile phone to mark their ballot. Elections held using remote voting can be contentious because it is difficult to verify that the voter is who he/she claims to be. Both anonymity and privacy are compromised because others can watch the elector vote. This opens the door to voter coercion and vote buying. Phone Phone voting also composes a separate category of electronic voting, when it is used independently of Internet/private network. Votes are cast either through a touch-tone system or through SMS text messages on mobile phones. Authentication is achieved through the use of PIN and access codes. Phone voting depends on highly centralised, private infrastructures which are also unreliable and insecure. 3 Problem Solution This framework proposes an EVS (Electronic Voting System. It has to be a secure application for the conduct of electronic elections through the Internet. It has to be a web application based on its own security protocol. It has to be also modular and tolerant enough to resist anyone who would attempt to violate security mechanisms. It will offer a combination of new features, which renders it an alternative suggestion to existing and tested e-voting systems. With the proposed system we hope to attract developers, by offering the motive of the open framework, for further development. Since the proposed e-voting system will be implemented it has to be applied and tested real elections. 3.1 Legal Aspects As, e-voting is not prohibited by Greek Constitution, the procedure followed should require strict identification and authentication of the individual. A main tool in this technical system can be the digital signature for every voter, issued by the public administration, delivered in a secure manner to identified and authenticated citizens [62]. In accordance with the principle of technological neutrality, the electronic signature can also be made via other technical means, such as mobile phone, pc/internet [31]. The second fundamental principle of the protection of privacy and voter anonymity should be applied through (a) The unequivocal identification of the voter, (b) The establishment of an election committee in order to ensure verifiability and reproducibility of the election and (c) the protection from sabotage either by external attacks or by voters or candidates attempting to disturb the elections. In order to guarantee free suffrage, firstly, the machine which the voter is using to vote must advise him/her that his/her vote has reached its destination. Secondly, the encryption of the data transmitted must be so designed as to ensure that no electronic ballot paper which has been altered will be counted. Thirdly, the way in which persons using electronic voting are guided through the procedure must not be such as to encourage them to vote precipitately or without reflection [31]. As a fourth requirement, the legislation states, that before voting, voters must have their attention explicitly drawn to the fact that, by submitting their vote by electronic means, they are playing a valid part in a ballot. Fifthly, it must not be possible for any manipulative message to appear during the process of electronic voting on the machine being used by the voter to cast the vote. Finally, as they vote, voters must be able to alter their choice before submitting their vote, or to break off the procedure. In any case the legal standards follow the pattern of the five basic principles of democratic elections and referenda: universal, equal, free, secret and direct suffrage. These five principles have to be equally applicable to e-voting as to traditional elections or referenda. However, e-voting is not ruled by specific provisions, in Greek Legislation, although the process is followed in elections collective management bodies (higher education). 3.2 Technical Aspects There are 3 main entities involved in the e-voting system: the Election, the Committee, and the Voter. The election authority is a group of administrators or system supervisors. The Election committee is a group of voters that have been selected by the authority and are responsible for interacting with the voters in order to give them access to the system. ISBN:
6 The Voter must have 2 valid accounts in order to complete the procedure of casting a vote. The procedure consists of 10 steps which are presented next: (1) Enrolment, (2) Create Voter record, (3) System Login, (4) Enter election, (5) Apply participation to election committee, (6) Check and validation by the election committee, (7) Creation of digital signature, (8) Ballot fill-in and vote casting, (9) Ballot encryption and (10) Announcement of valid ballots. Step 1: This step is mandatory for non-registered voters. In the case the voter must visit the election authority in person, and fill in the registration form. Moreover, the voter can choose a username and password with which s/he can login to the system as a simple user. Step 2: During the voter registration process, 3 cryptographic keys are created, which are: passkey, public key, and private key. The passkey is sent to the primary account, and the public key is sent to the secondary account, while the private key is securely kept in the system. Step 3: The voter logs in to the system, using the username and password, as a simple user. Step 4: The voter enters the elections using his passkey. Step 5: The voter applies for participation to the relevant election procedure. Also, the election committee is notified, and checks the voter s record. Step 6: The election committee gives the voter access to the relevant election procedure, while a random set of characters (message digest) is sent to the voter. Step 7: The voter creates a digital signature, using the system with his public key and the message digest received from the election committee. Step 8: The voter fills in the ballot, signs it with the digital signature, and sends it to the election committee, while he applies a crypt key. Step 9: The ballot contents are encrypted using the crypt key which is not stored on the system, and are temporarily saved on the system. Once the ballot is successfully validated and counted a ticket vote is sent to the voter. The voter can use this ticket vote in order to make sure that the ballot was successfully counted. Step 10: After the end of the voting procedure, all the ticketvotes that have been successfully counted are announced on the election bulletin board. If a voter does not find his/her ticketvote on this board, then s/he can fill in an application and send it to the election committee in order to reexamine the ballot. 4 Discussion There are many advantages of this new technology in comparison to manual / paper-based voting [4]. The fundamental advantages include: Accessibility The participation is less limited by geography, disability or networks. Accuracy A high profile case of manual counting inaccuracy may occur. Using e-voting, human error can be eliminated in the tally stage. Since the votes are stored electronically, it totals the votes more accurately than a human would even if he or she were to recount the votes many times over [29]. Care for Special Needs An additional feature that makes electronic voting more favourable is that it assists disabled citizens. With this feature voting would be a much easier task to complete for disabled citizens [63, 64]. Convenience E-voting is more convenient for voters. For national election, more polling booths can be set-up using remote connection for ballot collection. This reduces voters' travel time and significantly increases voter turnout. Voters are allowed to vote from any location at their convenience. Cost The use of electronic ballot removes the cost of producing a physical paper ballot. The use of some remote communication mechanisms also minimises the cost of transporting physical ballots for aggregation of voting result. Ballot counting automation using a computer application minimises administration overhead and reduces the number of officials required for the counting process. Efficiency Using some electronic means (e.g. optical mark sense sheets, touch screen voting, remote connection), tally stage to reveal voting result is made more efficient. Ballots tabulation and the aggregation of results from different polling locations can be done electronically [39]. Facilitation The citizens can access information and provide input which previously has often been restricted [38]. Multi language support Another advantage is that it appeals to citizens whose main language is not English. Electronic voting is basically a digital voting system, so the characters on the screen can be easily changed to whatever is desired by the user [29]. Timeliness ISBN:
7 It is the opportunity to participate in voting when it takes place. A vote is instantly counted, so there is no time gap between casting the ballot and counting it [29]. The machines are also hard to tamper with, because of how they are connected [54]. There are also some disadvantages in electronic voting systems. They include: Closed source code One more flaw of the electronic voting system is that its source code is closed. This means that the public cannot examine the source code on the machine, so if a programmer of the code were to be bribed, threatened, or the manufacturer itself is willing to rig an election, they would have a high chance of hacking the vote [6]. Coercion Resistance The electronic voting system has the appropriate mechanisms to prevent a user to prove how he voted. But this is also a flaw of the electronic voting system since there is no way for a voter to know what the machines record when they cast their vote and also there are no physical paper evidence available for a recount or a receipt to ensure that the voter voted for their choice [6]. This is quite a flaw, because if there is ever a crash in system, there will be no paper trail to follow. With no paper trail, there is not even the slightest chance in recreating the votes. Privacy One major obstacle to the success of e- democracy is that of citizen identification. For secure elections and other secure citizen-togovernment transactions, citizens must have some form of identification that preserves privacy [10]. Security Another drawback of the electronic voting system is the security. Software on the machines is checked only for logic-errors and vote-counting mistakes but not for security holes. Also, all the tests performed on the software were automated, and the hardware was not tested at all, which is quite a concern [10]. Basically there is no security on this software and hardware, allowing hackers to rig an election by attaching a standard keyboard to the machine and invoking supervisory commands [6]. Running under a public operation system such as Windows, which did not receive its latest security upgrades, it is vulnerable to certain viruses and worms if it should ever connect to the Internet [6]. A way around this problem would be to change to a different operating system, preferably open-source. Additional disadvantages Another flaw is that there are many vested interests that would be harmed by a more direct democracy. As technology advances, everyday things that we use become inferior. These inferior objects are then phased out of society until they show up in a museum. Though this can be a good thing, some advances can be too fast and leave the new technology very vulnerable to sceptics because of its flaws. When technology becomes involved in the voting system, it cannot be sure that the technology will even work right. The e-voting experience in Ohio in 2004 [65] is one of the well-known examples which caused many discussions about vote miscount and modification. Therefore, it is not easy to say that an accurate and faultless e-voting is likely to become viable soon for governmental elections. A quote attributed to Stalin says: Those who cast the votes decide nothing. Those who count the votes decide everything. It is clear that voting systems represent a critical component of a democracy. When voting takes place in an electronic environment, possibility of fraud is unavoidable since ensuring the trust is not an easy task [28]. At any step in the e-voting process, e-voting results can be manipulated if there is lack of verification and validation. Majority of people may accept and use e- voting, but people have some doubts about the privacy, security and accuracy of the e-voting. The deployment of e-voting systems has not to be done at the expense of conducting fair elections. It is instructive that some advocates of Internet voting [41] agree that the risks are too great for national elections where the fabric of democracy is at risk. However, they point out that there are a number of smaller elections (e.g. school boards) where participation is scanty and there is less at stake. These would be good potential candidates for experiments in Internet voting. 5 Conclusions The application of such a system is hard to convince the parties, their candidates and the voters about its reliability and integrity. There is also skepticism about the security, the anonymity and the voting documentation procedures that the system fulfils. Their concern is to ensure that the results were authentic and not manipulated, and that the anonymity of each voter would be fulfilled. A drawback related to the e-voting systems in general is the uncoercibility, i.e whether the EVS has the appropriate mechanisms to prevent a user proving how he voted. On the other hand, the voter wants to know what the machines record when they cast their vote [6]. ISBN:
8 The design of e-voting systems must be treated as a socio-technical problem and indeed one that might with benefit be treated differently in countries with differing existing practices and attitudes [60]. In fact we believe that at least equal weight must be given to socio-technical issues such as (i) system understandability and usability, and (ii) the roles, both positive and negative, likely to be played by the various people and organizations involved in the overall voting process, as is given to any attestations by technical experts as to the trustworthiness of complex e-voting hardware and software. As future work, the extension of the framework, so that other equipment such as personal digital assistances (PDAs), mobile phones, and cable TV will be applicable. Special consideration has to be given regarding disabled people. References: [1] Alvarez, R. M. & Hall, T. E. (2004). Point: Click and Vote: The Future of Internet Voting. Brookings Institution Press. [2] Artenton, F. (1987). Teledemocracy: can technology Protect Democracy?. Sage Newdury park, CA. [3] Bannet, J., Price, D., Rudys, A., Singer, J., & Wallach, D. (2004). Hack-a-vote: Security issues with electronic voting systems. In proc of the IEEE Symposium on Security and Privacy, volume 2, [4] Bederson, B. B., Lee, B. & Sherman, R. M. (2003). Electronic voting system usability issues. In Human Factors in Computing Systems: Proceedings of CHI, pages ACM. [5] Benaloh, J. C. & Tuinstra, D. (1994). Receiptfree secret-ballot elections (extended abstract). In STOC, [6] Boutin, P., (2004). "Is E-voting Safe?". PC World pp [7] Centikaya, O. & Centikaya, D. (2007). Verification and validation issues in electronic voting. The Electronic Journal of e- Government, 5(2): [8] Chaum, D. (1981). Untraceable electronic mail, return address, and digital pseudonym. Communications of the ACM, 24(2): [9] Chaum, D. (1987). Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In proc of Computer Science on Advances in Cryptology- EUROCRYPT, [10] Chaum, D., Ryan, P. Y. A. & Schneider, S. A. (2005). A practical voter-verifiable election scheme. In ESORICS, pages [11] Chen, Y.-Y., Ke Jan, J. & Chen, C.-L. (2004). The design of a secure anonymous internet voting system. Computers & Security, 23(4): [12] Cranor, L. F. & Cytron, R. K. (1997). Sensus. A security-conscious electronic polling system for the Internet. Hawaii International Conference on System Sciences, 3:561. [13] Diebold: Diebold electronic voting machine information sheet. diebold_accuvote-ts_v0.8.pdf. (2004). Accessed 15 January [14] Dill, D., Mercuri, R., Neumann, P. & Wallach, D. (2003). Frequently asked questions about dre voting system. org/drefaq.asp. Accessed 10 January [15] Dini, G. (2003). A secure and available electronic voting service for a large-scale distributed system. Future Generation Comp. Syst., 19(1): [16] Draper, S. W. & Brown, M. I. (2004). Increasing interactivity in lectures using an electronic voting system. Journal of Computer Assisted Learning, 20: [17] Fujioka, A., Okamoto, T. & Ohta, K. (1992). A Practical Secret Voting Scheme for Large Scale Elections. In Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, Springer-Verlag. volume 718, [18] Fischer, E. (2003). Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues, Congressional Research Service, The Library of Congress, November 4, [19] Ghassan, Z. & Taha, R. (2007). Electronic voting systems: Requirements, design, and implementation. Elsevier Computer Standards and Interfaces, 29(1): [20] Global Election Company: Election.com. Accessed 15 January [21] GNU. (1999). Gnu free referenda and elections electronically. Accessed 15 January [22] Gonggrijp, R., Hengeveld, W.-J., Hotting, E., Schmidt, S. & Weidemann, F. (2009). Riesrijnland internet election system: A cursory study of published source code. In VOTE-ID 09: Proceedings of the 2nd International ISBN:
9 Conference on E-Voting and Identity, Berlin, Heidelberg. Springer-Verlag [23] Gritzalis, D. (2002). Principles and requirements for a secure e-voting system. Computers & Security, 21(6): [24] Gritzalis, D. (2003). Secure Electronic Voting: Part III, Trends and Perspectives, Capabilities and Limitations. Kluwer Academic Publishers. [25] Hirt, M. & Sako, K. (2000). Efficient receiptfree voting based on homomorphic encryption. In proc of Advances in Cryptology EUROCRYPT, [26] Jan, J., Chen, Y.-Y. & Lin, Y. (2001). The design of protocol for e-voting on the internet. In IEEE International Carnahan Conference on Security Technology, [27] Jan, J. Tai & C.-C. (1997). A secure electronic voting protocol with ic cards. Journal of Systems and Software, 39(2): [28] Jones, D., (2005). Threats to voting systems, NIST Workshop on Threats to Voting Systems, October. [29] Kahaner, Larry. (2004). "Too Good to Give Up On" Government Enterprise pp [30] P. Kalampouka-Giannopoulou, Law of Transactions, Legal Library, [31] J. Karakostas, Law and Internet, Sakkoulas, [32] Karlof, C., Naveen, S. & Wagner, D. (2005). Cryptographic voting protocols: A systems perspective. In proc of the 14th USENIX Security. Symposium, July-August (2005). [33] Karro, J. & Wang, J. (1999). Towards a practical, secure, and very large scale online election. Computer Security Applications Conference, Annual, 0:161. [34] King, J. (2006). Democracy in the information age. Australian Journal of Public Administration, 65(2): [35] Kofler, R., Krimmer, R., Prosser, A. & Prosser, E. (2003). Electronic voting: Algorithmic and implementation issues. In Proceedings of the 36th Hawaii International Conference on System Sciences. [36] Lin, I.-C., Hwang, M.-S. & Chang, C.-C. (2003). Security enhancement for anonymous secure e-voting over a network. Computer Standards & Interfaces, 25(2): [37] Löffler, E. (2004) URL: h/ interview4.html. [38] Mercuri, R. (2002). Humanizing voting interfaces. aper.html. Paper presented at the Usability Professionals Association Conference, Orlando, Florida. [39] Miller, Harris N. (2004). E-voting Works. USA Today, News, pp.13a. [40] Mitrou, L., Gritzalis, D. & Katsikas, S. K. (2002). Revisiting legal and regulatory requirements for secure e-voting. In SEC 02: Proceedings of the IFIP TC11 17th International Conference on Information Security, , Deventer, The Netherlands, The Netherlands. Kluwer, B.V. [41] Mohen, J. & Glidden, J. (2001). The case for internet voting. Communications of the ACM, 44(1): [42] Novak, V., Locke, L. A., Hylton, H., Land, G., Morrissey, S. & Thigpen, D. (2004). The vexations of voting machines. Time, 163 (18), [43] Okamoto, T. (1997). Receipt-free electronic voting schemes for large scale elections. In Fifth Workshop on Security Protocols, volume 1, LNCS. [44] Phillips, D. M. & von Spakovsky, H. A. (2001). Gauging the risks of internet elections. Communications of the ACM, 44(1): [45] Postnote: Online Voting, UK Parliamentary Office of Science and Technology, vol. 1, no. 155, 1 4, (2001) Online: Accessed 18 January [46] Pratchett, L. & Wingfield, M. (2004). Electronic voting in the United Kingdom: lessons and limitations from the UK experience. Electronic Voting and Democracy, Palgrave Macmillan, New York, NY, [47] Qadah, G. Z. & Taha, R. (2007). Electronic voting systems: Requirements, design, and implementation. Computer Standards & Interfaces, 29(3): [48] Rezende, P. (2004). Electronic voting systems: is Brazil ahead of its time? RSA CryptoBytes, 7(2). [49] Roth-King, S. (1998). Disenfranchised by design: voting systems and the election process, Information Design Journal, Volume 9, No. 1. [50] Rubin, A.: (2001). Security considerations for remote electronic voting over the Internet. The Magazine of USENIX and SAGE, 1(26): [51] SAFEVOTE (2006). Safevote secure login ballot evs. Accessed 19 January [52] Saleh, K., El-Morr, C., Mourtada, A. & Morad, Y. (2003). Specifications for a mobile-agent platform and an internet-based mobile electronic voting application. In International Conference on Specifications for a mobile-agent platform and an internet-based mobile electronic voting application. In International Conference on Internet Computing, ISBN:
10 [53] Saltman, R. (1988). Accuracy, integrity, and security in computerized vote-tallying. U.S. Department of Commerce, National Bureau of Standards. [54] Selker, Ted. (2004). Fixing the Vote. Scientific American pp [55] Simhalu, S. K. & Takeda, K. (2007). Browser based agile e-voting system. In ASIAN, volume 4846 of Lecture Notes in Computer Science, Springer [56] SureVote. (2005). Surevote company evs system. Accessed 19 January [57] Stuart, S., Brown, M. & Draper, S. (2004). Using an electronic voting system in logic lectures: one practitioner's application, Journal of Computer Assisted Learning, vol. 20, Apr [58] Trueballot: Trueballot company, (2003). Accessed 19 January [59] Tsagarousianou, R., Tambini, D. and Bryan, C. (1998). Cyberdemocracy: Technology, Cities and Civic Networks, Routledge, London. [60] Valsamidis, S., Nerantzis, V., Kerenidou, E., Karakos, A. (2010). Survey on e-voting and electoral technology for Balkan and South- Eastern Europe countries, In Proc. of the EBEEC 2010 (pg ), Kavala, Greece. [61] Valsamidis, S., Mandilas, A., Kontogiannis, S., Karakos, A., "ELAN, an alternative approach to e-voting systems, focused on elections data analysis", (MIBES) 2011 International Conference, September 2011, Serres, Greece. [62] J. Velentzas, Law of technology and innovation, Ius, [63] Voting Accessibility for the Elderly and Handicapped Act. (1994). 42 U.S.C et. seq. [64] Voting System Accessibility Comparison. (2001). Nat l Organization on Disability, Washington, DC. [65] Wikipedia (2007). US presidential election controversy and irregularities, Available: _U.S._presidential_election_controversy_an d_irregularities, last accessed 10 March ISBN:
CHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationE-Voting, a technical perspective
E-Voting, a technical perspective Dhaval Patel 04IT6006 School of Information Technology, IIT KGP 2/2/2005 patelc@sit.iitkgp.ernet.in 1 Seminar on E - Voting Seminar on E - Voting Table of contents E -
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationSMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:
SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationE-Voting Systems Security Issues
E-Voting Systems Security Issues 1 Abdalla Al-Ameen, 2 Samani A. Talab 1, Deanship of the Preparatory Year,Al Jouf University, Al Jouf, Kingdom of Saudi Arabia, Abda711_su@hotmail.com *2, Department of
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationDESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationStatement on Security & Auditability
Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It
More informationElectronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)
Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department
More informationTowards a Practical, Secure, and Very Large Scale Online Election
Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationL9. Electronic Voting
L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections
More informationAn untraceable, universally verifiable voting scheme
An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect
More informationAdditional Case study UK electoral system
Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationCity of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013
City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More informationEXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering,
EJISDC (2005) 22, 5, 1-9 EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN Mohsen Kahani (kahani@um.ac.ir) Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran Abstract Electronic
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationSEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE
SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE STUDENT NAME: Adrian Dulaj STUDENT NUMBER: 09 336 595 COURSE NAME: Masters in European Business DEPARTMENT: Department of SES
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationOnline Voting System Using Aadhar Card and Biometric
Online Voting System Using Aadhar Card and Biometric Nishigandha C 1, Nikhil P 2, Suman P 3, Vinayak G 4, Prof. Vishal D 5 BE Student, Department of Computer Science & Engineering, Kle s KLE College of,
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationSTATE OF NEW JERSEY. SENATE, No th LEGISLATURE
SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JANUARY, 0 Sponsored by: Senator NIA H. GILL District (Essex and Passaic) Senator SHIRLEY K. TURNER District (Hunterdon and Mercer) SYNOPSIS Requires
More informationIC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes
IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationSmart Voting System using UIDAI
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student
More informationWHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?
WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? AVANTE INTERNATIONAL TECHNOLOGY, INC. (www.vote-trakker.com) 70 Washington Road, Princeton Junction, NJ
More informationThe E-voting Controversy: What are the Risks?
Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationARKANSAS SECRETARY OF STATE. Rules on Vote Centers
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are promulgated pursuant
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationSecurity Assets in E-Voting
Security Assets in E-Voting Alexander Prosser, Robert Kofler, Robert Krimmer, Martin Karl Unger Institute for Information Processing, Information Business and Process Management Department Production Management
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationA paramount concern in elections is how to regularly ensure that the vote count is accurate.
Citizens Audit: A Fully Transparent Voting Strategy Version 2.0b, 1/3/08 http://e-grapevine.org/citizensaudit.htm http://e-grapevine.org/citizensaudit.pdf http://e-grapevine.org/citizensaudit.doc We welcome
More informationVolume I Appendix A. Table of Contents
Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationL14. Electronic Voting
L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More informationAadhaar Based Voting System Using Android Application
Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,
More informationDesigning issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.
PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer
More informationARKANSAS SECRETARY OF STATE
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 Revised April 6, 2018 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are
More informationOffice for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING
Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING Warsaw 24 October 2008 TABLE OF CONTENTS I. INTRODUCTION...
More informationTO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration
TO: Chair and Members REPORT NO. CS2014-008 Committee of the Whole Operations & Administration FROM: Lori Wolfe, City Clerk, Director of Clerk s Services DATE: 1.0 TYPE OF REPORT CONSENT ITEM [ ] ITEM
More informationAct means the Municipal Elections Act, 1996, c. 32 as amended;
The Corporation of the City of Brantford 2018 Municipal Election Procedure for use of the Automated Tabulator System and Online Voting System (Pursuant to section 42(3) of the Municipal Elections Act,
More informationEvery electronic device used in elections operates and interacts
MONITORING ELECTRONIC TECHNOLOGIES IN ELECTORAL PROCESSES 13 CHAPTER TWO: Introduction to Electronic Technologies in Elections INTRODUCTION Every electronic device used in elections operates and interacts
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationElectronic Voting Machine Information Sheet
Name / Model: eslate 3000 1 Vendor: Hart InterCivic, Inc. Voter-Verifiable Paper Trail Capability: Yes Brief Description: Hart InterCivic's eslate is a multilingual voter-activated electronic voting system
More informationSecured Electronic Voting Protocol Using Biometric Authentication
Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before
More informationTokenVote: Secured Electronic Voting System in the Cloud
TokenVote: Secured Electronic Voting System in the Cloud Fahad Alsolami Department of Information Technology King Abdulaziz University, KSA Abstract With the spread of democracy around the world, voting
More informationE-Voting Solutions for Digital Democracy in Knowledge Society
55 Informatica Economică vol. 20, no. 3/2016 E-Voting Solutions for Digital Democracy in Knowledge Society Marian STOICA, Bogdan GHILIC-MICU Department of Economic Informatics and Cybernetics, Bucharest
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationFAQ s Voting Method & Appropriateness to PICC Elections
Purley Masjid, 63 Whytecliffe Road South, Purley, CR8 2AZ E-mail: info@purleyicc.com Purley Islamic Community Centre Registered in England Registration No.: 06902369 Registered Charity No.: 1146668 FAQ
More informationOn Some Incompatible Properties of Voting Schemes
This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties
More information^Sfl^.t f I I THE MUNICIPAL EXPERTS. The Voters' Guide to. Accessible Voting. ^' Ontario. .c^>_
^Sfl^.t f I I THE MUNICIPAL EXPERTS The Voters' Guide to Accessible Voting.c^>_ ^' Ontario Note To The Clerk This guide provides details for the public on how to use the voting method being employed by
More informationRemote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationThe Security of Elections. can be done on a computer screen. As the result of this, there s been a push to add voting to the
Zachary Goldman 12/13/2017 Comp116: Security The Security of Elections ABSTRACT In an age of digitalization, most everything that was previously done with pen and paper can be done on a computer screen.
More informationGAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments
GAO United States Government Accountability Office Report to the Chairman, Committee on Rules and Administration, U.S. Senate September 2008 ELECTIONS States, Territories, and the District Are Taking a
More informationElectronic Voting in Belgium Past, Today and Future
Electronic Voting in Belgium Past, Today and Future Danny De Cock K.U.Leuven ESAT/COSIC Slides available from http://godot.be/slides Electronic Voting in Belgium: Past, Today and Future 1 Outline Classic
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationCitizen engagement and compliance with the legal, technical and operational measures in ivoting
Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does
More informationTHE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING Abbas Akkasi 1, Ali Khaleghi 2, Mohammad Jafarabad 3, Hossein Karimi 4, Mohammad Bagher Demideh 5 and Roghayeh
More informationVOTERGA SAFE COMMISSION RECOMMENDATIONS
VOTERGA SAFE COMMISSION RECOMMENDATIONS Recommended Objectives, Proposed Requirements, Legislative Suggestions with Legislative Appendices This document provides minimal objectives, requirements and legislative
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationInternet Voting the Estonian Experience
Internet Voting the Estonian Experience Sven Heiberg sven@cyber.ee Department of Information Security Systems Cybernetica AS Tartu, Estonia Abstract Estonia has offered Internet Voting as a method to participate
More informationDIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY
DIRECTIVE 2012-56 November 20, 2012 To: Re: All County Boards of Elections Directors, Deputy Directors, and Board Members Post-Election Audits SUMMARY In 2009, the previous administration entered into
More informationResponse to the Scottish Government s Consultation on Electoral Reform
Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationAn Object-Oriented Framework for Digital Voting
An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo
More informationSECURE e-voting The Current Landscape
SECURE e-voting The Current Landscape Costas LAMBRINOUDAKIS 1, Vassilis TSOUMAS 2, Maria KARYDA 2, Spyros IKONOMOPOULOS 1 1 Dept. of Information and Communication Systems, University of the Aegean 2 Karlovassi,
More informationDistributed Protocols at the Rescue for Trustworthy Online Voting
Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2
More informationM-Polling with QR-Code Scanning and Verification
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech
More informationFULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF
FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It
More informationIC Chapter 3. Counting Ballot Card Votes
IC 3-12-3 Chapter 3. Counting Ballot Card Votes IC 3-12-3-1 Counting of ballot cards Sec. 1. (a) Subject to IC 3-12-2-5, after the marking devices have been secured against further voting under IC 3-11-13-36,
More informationElections, Technology, and the Pursuit of Integrity: the Connecticut Landscape
Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape Theodore Bromley 1 Peggy Reeves 2 Alexander Shvartsman 3 Abstract Transition from lever voting machines to electronic voting
More informationI-A. Voting Systems As Part of Cyber Security Critical Infrastructure.
Developing a Framework to Improve Critical Infrastructure Cybersecurity Under Executive Order 13636 [2] ( Executive Order ), the Secretary of Commerce is tasked to direct the Director of NIST to develop
More information2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting
2018 Municipal Election Policies & Procedures Internet & Telephone Voting pickering.ca Index Authority 01 Definitions 02 Application of Procedures 03 Notice 04 Nomination Papers 05 Unofficial List of Candidates
More informationSMS based Voting System
IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani
More informationTowards One Person, One Vote via Real-Time Voter s Registration and Identification
Towards One Person, One Vote via Real-Time Voter s Registration and Identification B. Isong 1, O. Ekabua 2 and M. Mbodila 3 1 Department of Computer Science and Information Systems, University of Venda,
More informationPunchscan: Introduction and System Definition of a High-Integrity Election System
Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer
More informationConditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service
Corporate Banking Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service (Status 13 January 2018) 1. Scope of services (1) The Customer and its authorised
More information